How Your Cybersecurity Strategy Enables Better Business

Credit to Author: Greg Young| Date: Tue, 21 Mar 2023 00:00:00 +0000

84% of respondents in a Trend Micro global survey said cyber policies negatively impact employees’ abilities to do jobs in the office. Discover how an effective cybersecurity strategy can enable better business, instead of slowing it down.

Read more

AWS Graviton Use Cases

Credit to Author: Michael Langford| Date: Tue, 21 Mar 2023 00:00:00 +0000

Discover how AWS Graviton’s optimized processors help provide a superior price-performance ratio. Available for AWS-managed services, you’ll gain insight on strategies, use cases, and insight on how to get the most out of AWS Graviton.

Read more

S4x23 Review Part 3: Healthcare Cybersecurity Sessions

Credit to Author: Kazuhisa Tagaya| Date: Mon, 20 Mar 2023 00:00:00 +0000

This article focuses on the healthcare sector. Over the past two years, the healthcare sector has been in a constant state of emergency due to the COVID-19 pandemic, and as widely reported in the media, it has also been threatened by cyberattacks such as ransomware.

Read more

Emotet Returns, Now Adopts Binary Padding for Evasion

Credit to Author: Ian Kenefick| Date: Mon, 13 Mar 2023 00:00:00 +0000

Following a three-month hiatus, Emotet spam activities resumed in March 2023, when a botnet known as Epoch 4 began delivering malicious documents embedded in Zip files that were attached to the emails.

Read more

S4x23 Review Part 2: Evolving Energy Cybersecurity

Credit to Author: Kazuhisa Tagaya| Date: Mon, 13 Mar 2023 00:00:00 +0000

In this second report on S4x23 held last February, this article introduces the discussion on cyber security in the energy industry, which was one of the topics that attracted attention.

Read more

Examining Ransomware Payments From a Data-Science Lens

Credit to Author: Vladimir Kropotov| Date: Thu, 09 Mar 2023 00:00:00 +0000

In this entry, we discuss case studies that demonstrated how data-science techniques were applied in our investigation of ransomware groups’ ransom transactions, as detailed in our joint research with Waratah Analytics, “What Decision-Makers Need to Know About Ransomware Risk.”

Read more

Expanding Attack Blueprints: 2022 Annual Cybersecurity Report

Credit to Author: Trend Micro Research| Date: Tue, 07 Mar 2023 00:00:00 +0000

In this blog entry, we shine a spotlight on some of the most critical cybersecurity concerns of 2022, which we discuss in full in our annual cybersecurity report, “Rethinking Tactics: 2022 Annual Security Report.”

Read more

PCI Compliance Requirements Guide

Credit to Author: Michael Langford| Date: Thu, 02 Mar 2023 00:00:00 +0000

There are many challenges that accompany implementing PCI compliance within your organization. Discover how Trend Micro Cloud One™ – Network Security helps you overcome the complexities of maintaining PCI compliance and audit readiness.

Read more